You are a true hacker!With the help of your smartphone or tablet, you can play your friends.In their eyes, you bude this password cracker....
Showing results 1 to 20 of 1,449
Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world
Singtel says it will work with the telecoms equipment maker to identify possible applications of 5G networks for consumers and businesses, including trials for potential technologies on the mobile network.
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
A Chinese official has said that Apple CEO Tim Cook agreed to have Apple products inspected by Chinese network experts to ensure information safety and national security.
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
By Jesper M. Johansson Published by Microsoft Press (http://oreilly.com/catalog/9780735625044) Get the definitive reference for planning...
Deploying complex, high performance applications both locally and in a cloud service provider's network can be very challenging. DivvyCloud believes that it has the solution to this problem.
Distributed Denial of Service (DDoS) and routing attacks on online infrastructure increased last year according to a European agency for network security.
By Bryan Burns, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi,...
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Apple has issued a security update to address a critical security issue with OS X's Network Time Protocol service.
A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being used in attacks.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Together with the launch of updated custom Android software PrivatOS, the handset maker has revealed a new store dedicated to security and privacy applications.
As part of its FutureScape prediction series for 2015, IDC looked at the impending IoT space from a broad spectrum of angles, including network capacity, security and cloud.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
The National Security Agency has released a new open-source program for data network interoperability.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
A quantum communication network will first link the 2,000 kilometres from Beijing to Shanghai by 2016, with the country also vowing to build a global network by 2030.
New McAfee research claims that a worrying number of organizations are turning off advanced firewall features in order to avoid slowing down networks.
Telstra is working to bolster its position in Australia’s managed network and security services markets with the acquisition of Queensland’s Bridge Point.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)